diff --git a/docs/en-US/vnmc-cisco.xml b/docs/en-US/vnmc-cisco.xml index 3d201606625..1190910512c 100644 --- a/docs/en-US/vnmc-cisco.xml +++ b/docs/en-US/vnmc-cisco.xml @@ -312,4 +312,39 @@ +
+ Reusing ASA 1000v Appliance for new Guest Networks + You can reuse an ASA 1000v appliance in a new guest network after the necessary cleanup. + Typically, ASA 1000v is cleaned up when the logical edge firewall is cleaned up in VNMC. If + this cleanup does not happen, you need to reset the appliance to its factory settings for use + in new guest networks. As part of this, enable SSH on the appliance and store the SSH + credentials by registering on &PRODUCT; . + + + Open a command line prompt on the ASA appliance + + + Run the following: + ASA1000V(config)# reload + You are prompted with the following message: + System config has been modified. Save? [Y]es/[N]o:" + + + Enter N. + You will get the following confirmation message: + "Proceed with reload? [confirm]" + + + Restart the appliance. + + + + + Register the ASA 1000v appliance again with the VNMC: + ASA1000V(config)# vnmc policy-agent +ASA1000V(config-vnmc-policy-agent)# registration host vnmc_ip_address +ASA1000V(config-vnmc-policy-agent)# shared-secret key where key is the shared secret for authentication of the ASA 1000V connection to the Cisco VNMC + + +